securezeron / PcapNinja
A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and provides insights based on the captured data.
☆11Updated 6 months ago
Alternatives and similar repositories for PcapNinja:
Users that are interested in PcapNinja are comparing it to the libraries listed below
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated 6 months ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆25Updated 9 months ago
- ☆19Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆23Updated 2 months ago
- Tools used for Pentesting☆22Updated last year
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 7 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last year
- Manage attack surface data on Elasticsearch☆22Updated last year
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- ☆11Updated 3 months ago
- ☆14Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated 11 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated 11 months ago
- ☆20Updated 11 months ago
- ☆27Updated 2 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 4 months ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated last year
- ☆34Updated last year
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated last year
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆38Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated 9 months ago
- Tool for scanning domains for .git directories.☆13Updated last year